{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T06:13:34Z","timestamp":1763705614917,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T00:00:00Z","timestamp":1554681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EU","award":["653454"],"award-info":[{"award-number":["653454"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,8]]},"DOI":"10.1145\/3297280.3297429","type":"proceedings-article","created":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T12:18:47Z","timestamp":1556713127000},"page":"1475-1483","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Engineering privacy by design"],"prefix":"10.1145","author":[{"given":"Fatbardh","family":"Veseli","sequence":"first","affiliation":[{"name":"Capgemini Germany, Frankfurt am Main, Germany"}]},{"given":"Jetzabel Serna","family":"Olvera","sequence":"additional","affiliation":[{"name":"Goethe University Frankfurt, Frankfurt am Main, Germany"}]},{"given":"Tobias","family":"Pulls","sequence":"additional","affiliation":[{"name":"Karlstad University, Karlstad, Sweden"}]},{"given":"Kai","family":"Rannenberg","sequence":"additional","affiliation":[{"name":"Goethe University Frankfurt, Frankfurt am Main, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. EU Project CREDENTIAL. http:\/\/credential.eu. (accessed February 2018)."},{"key":"e_1_3_2_1_2_1","unstructured":"{n. d.}. Regulation (EU) 2016\/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)."},{"key":"e_1_3_2_1_3_1","unstructured":"2011. ISO\/IEC 27005 Information technology - Security techniques - Information security risk management."},{"key":"e_1_3_2_1_4_1","first-page":"2011","volume":"29100","year":"2011","unstructured":"2011. ISO\/IEC 29100:2011 - Information technology - Security techniques - Privacy framework.","journal-title":"ISO\/IEC"},{"volume-title":"Technical Report","author":"MQTT","key":"e_1_3_2_1_5_1","unstructured":"2015. MQTT Version 3.1.1. Technical Report. Organization for the Advancement of Structured Information Standards (OASIS)."},{"key":"e_1_3_2_1_7_1","unstructured":"2018. D3.3 Recommendations on Privacy-Enhancing Mechanisms. CREDENTIAL Project Deliverable. https:\/\/credential.eu\/publications\/deliverables\/d3-3-recommendations-on-privacy-enhancing-mechanisms\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Amazon. {n. d.}. Amazon Simple Notification Service (SNS). https:\/\/aws.amazon.com\/sns\/details\/"},{"key":"e_1_3_2_1_9_1","unstructured":"Patrick Bichsel C. Binding J. Camenisch T. Gross T. Heydt-Benjamin D. Sommer and G. Zaverucha. 2008. Cryptographic Protocols of the Identity Mixer Library. Technical Report RZ 3730 (99740). IBM Research GmbH."},{"key":"e_1_3_2_1_10_1","volume-title":"Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri, and Michael Stausholm.","author":"Bichsel Patrick","year":"2014","unstructured":"Patrick Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert Enderlein, Stefan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Janus Dam Nielsen, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri, and Michael Stausholm. 2014. D2.2 Architecture for Attribute-based Credential Technologies - Final Version. ABC4TRUST project deliverable. Available online at https:\/\/abc4trust.eu\/index.php\/pub."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054122"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Sean Brooks Michael Garcia Naomi Lefkovitz Suzanne Lightman and Ellen Nadeau. 2017. An Introduction to Privacy Engineering and Risk Management in Federal Systems. techical report NISTIR-8062. NIST.","DOI":"10.6028\/NIST.IR.8062"},{"key":"e_1_3_2_1_13_1","unstructured":"BSI. 2008. BSI Standard 100-2: IT Grundschutz Methodology."},{"key":"e_1_3_2_1_15_1","volume-title":"Rodica Tirtea, and Stefan Schiffner.","author":"Danezis George","year":"2014","unstructured":"George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le M\u00e9tayer, Rodica Tirtea, and Stefan Schiffner. 2014. Privacy and Data Protection by Design - from policy to engineering. Technical Report. ENISA."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0115-7"},{"key":"e_1_3_2_1_17_1","volume-title":"Flash Eurobarometer 443 -","author":"European Commission","year":"2016","unstructured":"European Commission. 2016. Flash Eurobarometer 443 - July 2016 \"e-Privacy\" Report."},{"key":"e_1_3_2_1_18_1","unstructured":"Google. {n. d.}. Google Cloud Messaging. https:\/\/developers.google.com\/cloud-messaging\/"},{"key":"e_1_3_2_1_19_1","volume-title":"Project Capillary: End-to-end encryption for push messaging, simplified. https:\/\/android-developers.googleblog.com\/2018\/06\/project-capillary-end-to-end-encryption.html?m=1.","author":"Hogben Giles","year":"2018","unstructured":"Giles Hogben and Milinda Perera. 2018. Project Capillary: End-to-end encryption for push messaging, simplified. https:\/\/android-developers.googleblog.com\/2018\/06\/project-capillary-end-to-end-encryption.html?m=1."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994637"},{"key":"e_1_3_2_1_21_1","unstructured":"ISO\/IEC. 2017. Project ISO\/IEC 27550 Information technology - Security techniques - Privacy engineering; https:\/\/www.iso.org\/standard\/72024.htm."},{"key":"e_1_3_2_1_22_1","volume-title":"Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6\/11.7, 11.4, 11.6\/SIG 9.2.2 International Summer School","author":"Karegar Farzaneh","year":"2016","unstructured":"Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix H\u00f6randner, Thomas Lor\u00fcnser, and Simone Fischer-H\u00fcbner. 2016. Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider. In Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6\/11.7, 11.4, 11.6\/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers (IFIP Advances in Information and Communication Technology), Anja Lehmann, Diane Whitehouse, Simone Fischer-H\u00fcbner, Lothar Fritsch, and Charles D. Raab (Eds.), Vol. 498. 76--91."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453876"},{"key":"e_1_3_2_1_24_1","volume-title":"International Workshop on Privacy Engineering (IWPE)","author":"Mart\u00edn Yod-Samuel","year":"2017","unstructured":"Yod-Samuel Mart\u00edn and Jos\u00e9 M del \u00c1lamo. 2017. A Metamodel for Privacy Engineering Methods. International Workshop on Privacy Engineering (IWPE) (2017)."},{"key":"e_1_3_2_1_25_1","unstructured":"Microsoft. {n. d.}. The STRIDE Threat Model. https:\/\/msdn.microsoft.com\/en-us\/library\/ee823878(v=cs.20).aspx."},{"key":"e_1_3_2_1_26_1","unstructured":"OpenID. 2007. OpenID Authentication 2.0. OpenID Foundation. http:\/\/openid.net\/specs\/openid-authentication-2{_}0.html"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139566"},{"key":"e_1_3_2_1_29_1","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin Alan F","year":"1968","unstructured":"Alan F Westin. 1968. Privacy and freedom. Washington and Lee Law Review 25, 1 (1968), 166.","journal-title":"Washington and Lee Law Review"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.05.075"}],"event":{"name":"SAC '19: The 34th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Limassol Cyprus","acronym":"SAC '19"},"container-title":["Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297429","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297280.3297429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:15Z","timestamp":1750208535000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297429"}},"subtitle":["lessons from the design and implementation of an identity wallet platform"],"short-title":[],"issued":{"date-parts":[[2019,4,8]]},"references-count":27,"alternative-id":["10.1145\/3297280.3297429","10.1145\/3297280"],"URL":"https:\/\/doi.org\/10.1145\/3297280.3297429","relation":{},"subject":[],"published":{"date-parts":[[2019,4,8]]},"assertion":[{"value":"2019-04-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}